New Social Engineering Tactic Uses PDFs in Business Email Compromise Attacks
Legitimate services can be exploited in social engineering, including business email compromise (BEC) attacks. Researchers at Check Point describe one current BEC campaign that’s using ...
Continue Reading